We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Graphs provide an excellent framework for interrogating symmetric models of measurement random variables and discovering their implied conditional independence structure. However,...
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
As third party logistic services become popular, the role of software agents increases in importance in terms of the logistics scheduling of buyers and sellers. To support many mo...
We study a dual channel supply chain in which a manufacturer sells to a retailer as well as to consumers directly. Consumers choose the purchase channel based on price and service...
Aussadavut Dumrongsiri, Ming Fan, Apurva Jain, Kam...